Published: Fri, May 19, 2017
Hi-Tech | By Ellis Neal

WannaCry ransomware shuts down Bengaluru's ATMs


Whatever the case, this second attack that went unnoticed for weeks proves the high degree of sophistication of such programs that were first developed by the NSA that would allow an attacker to easily install and propagate malicious software on computer networks.

"You'll wanna cry definitely when you run into it", said Matt Staats, senior field agent for Connecting Point Computers in Peru.

While organisations still struggle to reinstate normal service, there are fears that the vast spread of the ransomware will inspire more versions - and that many systems remain unpatched.

How is WannaCry different from other pieces of ransomware?

Here's what you should know about the ongoing cyber pandemic. Nissan Motor Manufacturing U.K.in Tyne and Wear, England, halted production after the ransomware infected some of their systems. Avoid clicking or opening any such attachment.

This renders the files inaccessible.

"They're holding your stuff ransom", Staats said.

The ransomware attack exploits a flaw in Windows and while this is serious, it not only shows the continued ubiquity of the firm, but it also demonstrates a number of corporations that were affected are still using the older and now unsupported versions of Windows, and that they need to hasten their efforts to upgrade their software packages.

Once the virus is in a computer, it looks for other vulnerable computers in a network to infect, which is why it spread so quickly. "This helps to guard against recently uncovered vulnerabilities that attackers can exploit".

Microsoft President and Chief Legal Officer, Brad Smith, explicitly told clients to update their software, but also pointed a finger at the National Security Agency and the governments that tech firms have conflicted over privacy issues.

Staats said because this ransomware targets Windows, people using Macs and Chromebooks seem to be in the clear.

Has it affected anyone in the Illinois Valley? "I hope that if another attack occurs, the damage will be a lot less". Those included China, Japan, United Kingdom or Germany.

The latest ransomware was successful because of a confluence of factors.

"This is an opportunity to improve something, and that's what we stand ready to do", he said. "We made sure this weekend all our machines were patched". Minimize business disruptions and gain the peace of mind that comes with knowing that the organization's data is more secure. "You've got to keep your systems updated".

The vulnerability has been known since February, when Microsoft cancelled its monthly Patch Tuesday deployment to address the problem. "If they don't have an automatic update mechanism and they don't apply patches manually, they're going to be at risk - it's as simple as that". "It all boils down to good operational practices", he said.

Do not open or click on any emails from unrecognized senders. It involves blocking someone's personal data on a computer and threatening to destroy or expose it if the person does not pay a ransom.

Fedex said Friday it was "experiencing interference with some of our windows-based systems caused by malware". "It never happens, because there are compelling reasons to stay the way it is", Nather said.

Like this: